Download presentation
Presentation is loading. Please wait.
1
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder
2
Objectives Types of Networks Components of Networks Risks to Networks Network Security/Controls Auditing Networks
3
What is a Network? Two or more connected computers that allow the process of telecommunications to occur Telecommunications is the transfer of text, audio, video, or other data formats
4
Types of Networks Characterized in 3 categories: Distance Ownership Client/Server Networks
5
Distance Local Area Network (LAN) Connected computers within a short geographical distance of one another Wide Area Network (WAN) Connects computer large geographic away from one another
6
Ownership Intranet Internal network within a company Extranet Connects internal network to outside business partners Virtual Private Network (VPN) Uses public internet connection but achieves privacy through encryption and authentication
7
Client/Server Networks Network servers that manage the networks and host applications that are shared with client computers Two types: Two-tiered Three-tiered
8
Network Security and Controls Authentication Process of ensuring users are who they say they are Encryption Scrambling or coding data so that anyone who views will not be able to decode it without a decryption key Firewalls Hardware and software to control outside access to the network
9
Components of a Network Computers and terminals Telecommunication channels Telecommunication processors Routers and Switching devices
10
Computers and Terminals Computers process data in a network and send/receive information to and from terminals Terminals serve as input/output devices
11
Telecommunications Channels Transmit data from computer to computer Physical transmitters Wireless transmitters
12
Telecommunications Processors Most common is a modem Transforms digital communication signals to analog signals for transfer and then back to digital signals Digital communication networks
13
Routers and Switching Devices Switches: connect network components and ensure messages are delivered to appropriate destinations Routers: similar to switches but with more complex features based on protocols Approaches to switching Message switching Packet switching Circuit switching
14
Risks to Networks Social Engineering Physical Infrastructure Threats Programmed Threats Denial of Service Threats Software Vulnerabilities
15
Social Engineering Diversion
16
“Soc-ing” VoIP Vulnerabilities – Can open channel to network that is not fire-walled Phishing Scams – i.e. – emails from unknown persons containing malicious links. Cross Site Scripting (XSS) – leads to account hijacking, changing of user settings, cookie theft/poisoning, or false advertising
17
Network Security Network manager and network security administration Authentication Encryption Firewalls
18
Auditing Networks Perform risk assessment procedures to assess vulnerabilities Evaluate controls and their effectiveness Auditing Network Security Network diagrams Determine what assets, who has access, and understand connections Penetration testing Benchmarking
19
Risk Assessment Procedures Basic vulnerabilities of a network Interception- transmitted data is intercepted by a third party Availability- unavailability of the network could result in losses for the firm Access/Entry points- a weak point in access can make the information assets vulnerable to intruders
20
Evaluate Controls Physical access controls Transmitted information should be encrypted Network should have sufficient management Controls to limit the type of traffic Passwords for everyone who has access
21
Auditing Networks Network diagrams Determine what assets Who has access Understand connections Penetration testing
22
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.